Research Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
Figure 10
Strategy evaluation, layered DAGs, 0%-nodes.
(a) Attacker, high noise |
(b) Attacker, low noise |
(c) Attacker, no noise |
(d) Defender, high noise |
(e) Defender, low noise |
(f) Defender, no noise |